Is Channel Fragmentation/Bonding in IEEE Networks Secure?

Size: px
Start display at page:

Download "Is Channel Fragmentation/Bonding in IEEE Networks Secure?"

Transcription

1 Is Channel Fragmentation/Bonding in IEEE Networks Secure? S. Anand, K. Hong Department of ECE Stevens Institute of Technology NJ S. Sengupta Department of Mathematics & Computer Science John Jay College, City University of New York NY R. Chandramouli Department of ECE Stevens Institute of Technology NJ Abstract We address a unique security threat that arises due to channel fragmentation (or aggregation or bonding) in dynamic spectrum access (DSA) based IEEE networks. Typically, channel fragmentation, aggregation and bonding have been studied in the literature as a means to enhance the spectrum utilization. However, the loss of orthogonality between the spectrum bands due to channel fragmentation, aggregation or bonding can be exploited by malicious attackers to cause a cognitive service disruption. We present an analysis of such a threat. We determine the optimal transmit powers a malicious attacker transmits on each fragment, so as to create imum service disruption. Numerical results indicate that a malicious attacker can cause up to about 16% loss in the capacity of the system as a consequence of fragmentation. Detailed analysis is presented for channel fragmentation and can be easily applied to channel aggregation and bonding. To the best of our knowledge, this is the first analysis of such cognitive service disruption threats due to fragmentation. Index Terms DSA Networks, IEEE , Channel Fragmentation, Aggregation, Bonding, Cognitive Service Disruption. I. INTRODUCTION Dynamic spectrum access (DSA) [1] based cognitive radio networks [2] were developed as a solution to the under utilization of spectrum due to fixed spectrum allocation. Unlicensed secondary users use the spectrum (called white spaces) unused by the licensed primary users. The IEEE wireless regional area networks (WRAN) [3] emerged as the first standards for cognitive radios. The physical layer (PHY) and medium access control (MAC) specifications for secondary to use the white spaces in the television (TV) transmission band can be found in [4]. The IEEE standard specify policies for channel fragmentation, bonding and aggregation (definitions of these terms are provided in the following paragraph). We identify a potential security vulnerability resulting due to these three features. We illustrate the practicality of the attack by test-bed experiments followed by a detailed theoretical analysis. Channel fragmentation, aggregation and bonding were studied as a means to enhance the spectrum utilization in DSA networks [5]-[9] and the references therein as well as n wireless LANs [10]. Channel fragmentation refers to allocating a portion of a spectrum band, e.g., if a channel has a bandwidth of 6 MHz, fragmentation allows allocation of a portion of the spectrum band corresponding to a bandwidth of 2 MHz to a user. It is also possible to combine two contiguous spectrum bands of 2 MHz each to provide a user a channel with 4 MHz bandwidth. This is called channel bonding. Alternatively, non-contiguous spectrum bands can be aggregated and allocated to users. The IEEE standard also specifies the policies for channel fragmentation, aggregation and bonding. Sengupta et al [5] proposed a utility based graph coloring algorithm that presented the advantages using channel fragmentation and aggregation. In [6], Song and Lin present and enhanced MAC protocol for DSA networks, where the effectiveness of channel fragmentation, aggregation and bonding were demonstrated by achieving enhanced throughput. Bahl et al provided an experimental set up for channel assignment that utilizes the white spaces in the spectrum. An architecture for the utilization of DTV white spaces incorporating channel fragmentation was provided in [8]. A detailed study of channel fragmentation and related works can be found in [9]. Although channel fragmentation, aggregation and bonding Fig. 1. Test-bed experiment demonstrating leakage on other channels due to bonding. resulted in larger throughput, we identify an important security vulnerability resulting due to these features. Typically the IEEE and n networks use orthogonal channels for transmission. However, fragmentation, aggregation or

2 bonding of channels can result in loss of orthogonality and hence, mutual interference or leakage from one channel to the other. To illustrate this, we conduct test bed experiments by implementing a cognitive radio prototype [11] based on a software abstraction layer over off-the-shelf IEEE a/b/g supported by Atheros hardware chip sets. We bond two channels (corresponding to 5.24 GHz and 5.26 GHz) and measure the power on all the other channels. Fig. 1 provides the wispy image of our experimental results. The green color in the bottom-most picture in the wispy image in Fig. 1 represents the average power on the channels and the blue color represents the peak powers measured on the channels. It is observed that a power of -40 dbm on the bonded channel results in a significant leakage on the neighboring spectrum bands. This is a consequence of the loss of orthogonality between spectrum bands resulting due to bonding. Similar consequences can also be expected for channel fragmentation and aggregation. The leakage demonstrated in Fig. 1 can result in a unique denial of service (DoS) threat in IEEE based DSA networks. A malicious attacker can exploit the correlation between the non-orthogonal fragments (resulting due to fragmentation or aggregation or bonding) and cause service disruption. Service disruption in wireless networks have traditionally been viewed as jamming attacks [12]. Cognitive radios are also susceptible to multi-channel jamming [13] where the jammer can switch channels to jam multiple channels or the attacker chooses a particular set of channels and jam them [14]. However, the service disruption threat due to fragmentation is significantly different because a malicious attacker can now transmit on channel j to cause service disruption on channel i. The attack exploits the loss of orthogonality between channels which is a consequence of fragmentation, aggregation and bonding. The service disruption need not be a complete DoS, but can be a loss in the channel capacity or loss in throughput, thus resulting in degraded quality-of-service (QoS). In this paper, we present an analysis of the service disruption caused by a malicious attacker in an IEEE based DSA network with fragmentation. We study the loss in capacity due to the attacks. We formulate an optimization problem in which the malicious attacker launches attacks on the channels so as to imize the leakage in the system. We use the correlation between the channels (obtained using standard inner product definition of correlation [15]). Numerical results indicate that at low transmit powers, malicious attackers do not cause significant loss in the capacity due to fragmentation. However, for larger transmit power of malicious attackers, fragmentation can result in service disruption causing upto about 16% loss in the channel capacity. In terms of data rates, this could be between 200 Kbps to 9 Mbps. To the best of our knowledge, this is the first analysis on service disruption due to fragmentation. While the analysis presented in this paper is applicable to any DSA network in general, it is particularly applicable to IEEE WRAN where the policies for fragmentation, aggregation and bonding has been specified. Detailed analysis is presented for fragmentation and can also be easily applied to channel aggregation and bonding. The rest of the paper is organized as follows. The description of the system and the analysis of the service disruption attack is provided in Section II. Numerical results are provided in Section III and conclusions are drawn in Section IV. II. COGNITIVE SERVICE DISRUPTION Consider a DSA network (e.g, an IEEE WRAN) with N orthogonal channels which can be used by secondary users when the primary users are inactive. Each of these N channels can be fragmented into K sub-channels. Henceforth, throughout the paper, channel refers to one of the N K fragments in the system, unless explicitly mentioned otherwise. The N K fragments need not be mutually orthogonal, in general. Therefore, when signals are transmitted in the i th fragment (1 i NK), it causes energy leakage in the j th fragment (j i). This kind of energy leakage can be exploited by malicious nodes in the network to disrupt the communication of the other good secondary users in the system. It is of interest to determine the service disruption caused by a malicious attacker to the good secondary users in the system. In order to perform the analysis, we consider the following system. There are NK fragments such that the correlation between fragments i and j is ρ ij. If the corresponding fragments are orthogonal, then ρ ij 0. On channel i, the attacker transmits a signal with signal strength, E i, that corresponds to a power, P i E i 2. The total power that can be transmitted by the attacker on all the channels is P tot. Let C [c ij ] 1 i NK, where c ij ρ ij, i j and c ii 0, 1 j NK i, represent the co-variance between channels i, j, i j. Let Let e [E i ] 1 i NK represent the vector of field strengths on all the channels and let p [P i ] 1 i NK be the vector of corresponding powers. Signals transmitted on any channel cause a leakage on the other channels since the fragmented channels are not orthogonal in general. The leakage caused by the attacker on the i th channel, l i, can be written as l i NK C ije j, i, (1) which, can be written as the matrix equation, l Ce, (2) where l [l i ] 1 i NK. If the channels are all mutually orthogonal, then c ij 0, i j. Since c ii 0, i, the leakage, l i 0, i. Since fragmentation results in nonorthogonal channels, l i 0, in general. The power leaked on the i th channel can be obtained as li 2. The average power leaked on all the channels in the system, P leaked, can be written as P leaked 1 NK li 2 NK 1 NK lh l 1 NK eh C H Ce, (3) where (.) H represents the Hermitian of a vector or a matrix. 2

3 Ideally, the malicious attacker allocates its total transmit power, P tot, on all the channels, such that the impact on each of the channels is highest. In order determine the impacts on all the channels, the attacker should have an exact knowledge of all the applications on all the channels in the system, which may not be possible in general. A more practical scenario is when the attacker tried to imize the average power due to leakage, P leaked, which can be formulated as the following optimization problem e e H C H Ce e H Ae, (4) e (where A C H C), subject to the constraint, NK P i e H e P tot. (5) The matrix, A, is a Hermitian matrix (i.e., A H A and hence, has real eigen values [16]. Let P be the matrix whose columns are the eigen-vectors of A. Since A is a Hermitian matrix, P can be chosen to be unitary [16] (i.e., P H P PP H the identity matrix, I. The vector, e can be written as [16] e Pd, (6) where d [d i ] 1 i NK is another vector of length, NK. Let the set of eigen-values of A (called the spectrum of A [16]), σ(a), be σ(a) {λ 1, λ 2,, λ NK } and without loss of generality, let λ 1 λ 2 λ NK. Such an ordering is possible since λ i s are real. It is then possible to formulate the optimization problem in (4) subject to (5), in terms of d. The following lemma from matrix theory is used in describing the optimization problem and constraint with respect to d. Lemma 2.1: [16] If P is unitary in (6), then e H e d H d. From Lemma 2.1, (5) can be written as d H d NK d 2 i P tot. (7) The optimization problem in (4) can then be re-written in terms of d as d dh P H APd d dh Dd, (8) where D is the diagonal matrix, diag(λ 1, λ 2, λ n ). Therefore, the optimization problem described in (8) subject to (7), is the optimization problem, subject to NK d NK U(d) d NK λ i d 2 i (9) d 2 i P tot. (10) The following lemmas and theorem will be used to solve the optimization problem in (9) subject to (10), which, in turn, will be used to solve (4) subject to (5). Lemma 2.2: If λ k < 0, d k 0 at the optimum point. Proof: Let d ] [ di be a feasible solution such 1 i NK that dk > 0. Consider another solution ˆd [ ] ˆdi 1 i NK, where ˆd k 0 and ˆd j d j, j k. Since d is a feasible point, d i 2 i P tot, i.e., ˆd i 2 i P tot. Therefore, ˆd is also a feasible point. The proof is complete if it can be shown that U( d) < U(ˆd). U( d) NK NK NK λ d i 2 i λ i d2 i + λ k d2 k λ i ˆd2 i + λ k d2 k λ i ˆd2 i since λ k < 0 < NK U(ˆd). Lemma 2.2 implies that positive d i s should be allocated only corresponding to positive eigen values. The following lemma provides a constraint on the positive d i s. Lemma 2.3: Let λ 1 λ 2 λ m > 0 and let λ i < 0, i > m, m NK. At the optimum point, m d2 i P tot, i.e., (10) is met with equality. Proof: From Lemma 2.2, d i 0, i > m. Consider a feasible point d [ ] di such that m d 2 i P < P tot. Let] P tot P. It is noted that > 0. Consider ˆd [ˆdi, such that ˆdm d m + and ˆd i d i, i 1, 2,,m 1, m + 1, NK. Therefore, NK ˆd 2 i m ˆd 2 i m 1 d 2 i + ˆd 2 m m 1 d 2 i + d 2 m + Delta P + Ptot, i.e., ˆd is also a feasible point with m ˆd i P tot. m U(ˆd) λ ˆd i 2 i m 1 λ d i 2 i + λ ˆd i 2 m m 1 λ i d 2 i + λ i d 2 m + Delta U( d) + > U( d) since > 0. From Lemmas 2.2 and 2.3, the following theorem which yields the optimum point, d, can be obtained. Theorem 2.1: Let λ 1 λ 2 λ m > 0, m NK and λ i < 0, i > m. The objective function in (9) subject to (10) is imized for d d [d i ] 1 i NK such that d 1 P tot and d i 0, i 2, 3,,NK. [ ] Proof: From Lemma 2.2, d i 0, i > m. Let d di such that d i > 0, 1 i m and m d i P tot, according to Lemma 2.3. Therefore, m m U( d) λ i d2 i λ 1 d2 i λ 1 P tot λ 1 (d 1) 2 U(d ). 3

4 Since d H d e H e, the malicious attacker transmits on all the channels such that (5) is met with equality. The optimal vector, e that solves (4) subject to (5) can be obtained from (6) with d replaced by d. The following theorem characterizes e. Theorem 2.2: Let λ 1 λ 2 λ m > 0, m NK. Let the eigen-vector of A corresponding to λ 1 be x 1 [x i1 ] 1 i NK. Then e P tot x 1 and the optimal power on the i th channel, Pi P tot x i1 2. Proof: From (6), e Pd. Since d 1 P tot and d i 0, 2 i NK from Theorem 2.1, e d 1 x 1 P tot x 1. Since Pi Ei 2, Pi P tot x i1 2 (resulting in Pi 0, i and NK P i P tot, i.e., feasible transmit powers on all the fragments). It is noted that in general, x i1 can be non-zero, i and hence, the malicious attacker transmits non-zero powers on all the fragments to create imum leakage. In the case of aggregation or bonding with no fragmentation, a similar scenario arises, which is explained as follows. Let the system contain N channels and let channels m and n be aggregated to result in N 1 channels in the system. Let m denote the new channel obtained by aggregating channels m and n. The channel, m need not be orthogonal to the other channels in the system and this, in turn can cause leakage into other channels. Similarly transmission on other channels can cause leakage into m. The analysis described in this paper can then be used to determine the transmit power of the attacker on each channel. Let Ñ be the white noise on all the channels in the absence of the leakage due to the transmission by the malicious attacker. Let the signal power on the i th fragment be S i. The signal-to-noise-ratio (SNR) on the i th fragment, γ i, is then given by γ i Si. In the presence of leakage due to transmission by a malicious attacker, the signal-to-interference- Ñ noise-ratio (SINR) on the i th fragment, ˆγ i, can be written as ˆγ i Si, where l l 2 i +Ñ i NK j1 C ije j. Note that ˆγ i < γ i, thus resulting in a degraded signal quality. For a channel with bandwidth, B, This degradation can result in( a degradation in the channel capacity by an amount, B log 1+γi 2 1+ˆγ i ). It is noted that jamming a particular channel also causes loss of capacity. However, fragmentation causes a larger threat because a malicious attacker can transmit on channel j to cause a loss of capacity on channel i. This kind of an attack is a result of fragmentation and aggregation because of loss of orthogonality between the fragments. Hence, the service disruption caused by the malicious attacker as a consequence of fragmentation and aggregation, is a cognitive service disruption where the attacker intelligently transmits powers on the channels to disrupt service on the other channels. III. RESULTS AND DISCUSSION We consider two systems, one with N 3 orthogonal channels (like the IEEE ), each with bandwidth, 20 MHz, fragmented into K 3 fragments, each with bandwidth, 6.66 MHz, thus resulting in N K 9 fragments in the system. We also study a system with N 13 orthogonal channels each fragmented into K 3 fragments, to result in NK 39 fragments in the system. We first consider a fixed value of P tot and compute the optimal transmit powers on all the channels in the system with NK 9 fragments. We then vary the total power that can be transmitted by the malicious attacker, P tot, and study the average loss in the capacity due to leakage. The optimal transmit power of the malicious attacker hence, the leakage on each channel, is obtained using the analysis described in Section II. The covariance matrix, C is generated using the standard inner product of the carrier frequencies [15]. TABLE I TRANSMIT POWERS FOR THE MALICIOUS ATTACKER WITH P tot 10 WATTS, ON EACH FRAGMENT IN A SYSTEM WITH N 3 ORTHOGONAL CHANNELS EACH FRAGMENTED INTO K 3 FRAGMENTS. Fragment Power (P i ) mw mw mw Watts mw mw Watts Watts mw Table I presents the transmit powers on all the fragments for a malicious attacker with P tot 10 Watts in a system with N 3 orthogonal channels, each fragmented into K 3 fragments, thus resulting in NK 9 fragments. It is observed that the transmit powers on all the fragments are non-zero, as argued in Section II. It is observed from Table I, that a small transmit power on any fragment (e.g., 133 mw in fragment 3) can also result in imum leakage on that fragment when combined with a larger transmit power on another fragment (e.g., 3.4 Watts in fragment 8). This reinforces the argument presented in Section I about cognitive service disruption resulting as a consequence of fragmentation. The average loss in the capacity was found to be 20 Kbps. We vary the total transmit power, P tot, and determine the average loss in capacity. Fig. 2 presents the average loss in the capacity in a system with N 3 orthogonal channels each fragments into K 3 fragments, thus resulting in NK 9 fragments. It is observed that the loss in capacity is negligible for low values of the total transmit power, P tot, where as, for large values of P tot, the loss is significant. The loss in capacity can be as large as 200 Kbps, which, for a system supporting 1-2 Mbps, is a loss of about 16%. The average loss is larger in the system with N 13 orthogonal channels fragmented into K 3 fragments (which typically supports 54 Mbps [4]), resulting in NK 39 fragments, as observed from Fig. 3. Here, loss of the order of up to 9 Mbps is observed. In a system supporting 54 Mbps traffic, this corresponds to a loss in capacity by 11%. The larger loss in capacity is caused due to that fact that there are larger number of fragments and hence, correlations between multiple pairs of fragments. This enables the attacker to transmit in more fragments and cause service disruption. 4

5 Average loss in the channel capacity (Kbps) Total transmit power, P (W) tot Fig. 2. Average loss in the capacity of due to cognitive disruption in a system with N 3 orthogonal channels each fragmented into K 3 fragments. Average loss in the channel capacity (Mbps) Total transmit power, P tot (W) [3] C. Cordeiro, K. Challapali, D. Birru, and S. Shankar, Ieee : The first worldwide wireless standard based on cognitive radios, Proc., IEEE Symposium of New Frontiers in Dynamic Spectrum Access Networks (DySPAN) 2005, pp , Nov [4] IEEE draft standard for information technology Telecommunications and information exchange between systems Local and metropolitan area networks Part 22.1: Standard to enhance harmful interference protection for low power licensed devices operating in the TV broadcast bands, Feb [5] S. Sengupta, S. Brahma, M. Chatterjee, and N. S. Shankar, Enhancements to cognitive radio based IEEE air interface, Proc. IEEE Intl. Conf. on Commun. (ICC 2007), pp , Jun [6] H. Song and X. Lin, A novel DSA driven MAC protocol for cognitive radio networks, Wireless Sensor Networks, vol. 61, no. 2, pp , Feb [7] P. Bahl, R. Chandra, T. Moscibroda, R. Murthy, and M. Welsh, White space networking withwi-fi like connectivity, Proc., SIGCOMM 2009, Aug [8] S. Deb, V. Srinivasan, and R. Maheshwari, Dynamic spectrum access in DTV white spaces: Design rules, architecture and algorithms, Proc., ACM Intl. Conf. on Mobile Computing and Networking (ICMC( 2009), Sep [9] E. Coffman, P. Robert, F. Simatos, S. Tarumi, and G. Zussman, Channel fragmentation in dynamic spectrum access systems: A theoretical study, ACM SIGMETRICS Perf. Eval. review, vol. 38, no. 1, pp , Jun [10] J. Geier, Designing and Deploying n Wireless Networks. Cisco Press, [11] S. Sengupta, K. Hong, R. Chandramouli, and K. P. Subbalakshmi, Spiderradio: A cognitive radio network with commodity hardware and open source software, To appear in IEEE Commun. Mag., [12] T. Basar, A Gaussian test channel with an intelligent jammer, IEEE Trans. on Info. Theory, vol. 29, no. 1, pp , Jan [13] A. Sampath, H. Dai, H. Zheng, and B. Y. Zhao, Multi-channel jamming attacks using cognitive radios, Proc. IEEE Intl. Conf. on Computer Commun. and Networking (ICCCN 2007), Aug [14] S. Anand, S. Sengupta, and R. Chandramouli, An attack-defense game theoretic analysis of multi-band wireless covert timing networks, Proc. IEEE Intl. Conf. on Computer Commun. (INFOCOM 2010), Mar [15] Y. Shmaliy, Continuous-time Signals (Signals and Communication Technology. Springer, [16] C. D. Meyer, Matrix Theory and Applied Linear Algebra. SIAM, Fig. 3. Average loss in the capacity of due to cognitive disruption in a system with N 13 orthogonal channels each fragmented into K 3 fragments. IV. CONCLUSION We presented the first discussion and analysis on a unique cognitive service disruption threat in IEEE based DSA networks, arising as a consequence of channel fragmentation. We presented an experimental result to motivate the problem and presented an analysis to determine the transmit power of the malicious attacker to create imum service disruption. Numerical results indicate that small transmit powers on a fragment can cause significant loss in capacity when combined with larger transmit powers on other fragments. It was also observed that fragmentation could result in loss of capacity of up to 16%. Mitigation of such threats is under investigation and is also a topic for further research. REFERENCES [1] M. Buddhikot, P. Kolodzy, S. Miller, K. Ryan, and J. Evans, DIMSUMnet: New directions in wireless networking using coordinated dynamic spectrum access, IEEE WoWMoM 2005, Oct [2] J. Mitola, Cognitive Radio: An integrated agent architecture for software defined radio. Ph.D. Dissertation, Swedish Royal Institute of Technology,

Combined Channel Aggregation and Fragmentation Strategy in Cognitive Radio Networks

Combined Channel Aggregation and Fragmentation Strategy in Cognitive Radio Networks Combined Channel Aggregation and Fragmentation Strategy in Cognitive Radio Networks Lei Li, Sihai Zhang, Kaiwei Wang and Wuyang Zhou Wireless Information Network Laboratory University of Science and Technology

More information

IMPROVED PROBABILITY OF DETECTION AT LOW SNR IN COGNITIVE RADIOS

IMPROVED PROBABILITY OF DETECTION AT LOW SNR IN COGNITIVE RADIOS 87 IMPROVED PROBABILITY OF DETECTION AT LOW SNR IN COGNITIVE RADIOS Parvinder Kumar 1, (parvinderkr123@gmail.com)dr. Rakesh Joon 2 (rakeshjoon11@gmail.com)and Dr. Rajender Kumar 3 (rkumar.kkr@gmail.com)

More information

Cross-layer Network Design for Quality of Services in Wireless Local Area Networks: Optimal Access Point Placement and Frequency Channel Assignment

Cross-layer Network Design for Quality of Services in Wireless Local Area Networks: Optimal Access Point Placement and Frequency Channel Assignment Cross-layer Network Design for Quality of Services in Wireless Local Area Networks: Optimal Access Point Placement and Frequency Channel Assignment Chutima Prommak and Boriboon Deeka Abstract This paper

More information

A Secure Transmission of Cognitive Radio Networks through Markov Chain Model

A Secure Transmission of Cognitive Radio Networks through Markov Chain Model A Secure Transmission of Cognitive Radio Networks through Markov Chain Model Mrs. R. Dayana, J.S. Arjun regional area network (WRAN), which will operate on unused television channels. Assistant Professor,

More information

To Fragment or Not To Fragment: Viability of NC OFDMA in Multihop Networks. Muhammad Nazmul Islam WINLAB, Rutgers University

To Fragment or Not To Fragment: Viability of NC OFDMA in Multihop Networks. Muhammad Nazmul Islam WINLAB, Rutgers University To Fragment or Not To Fragment: Viability of NC OFDMA in Multihop Networks Muhammad Nazmul Islam WINLAB, Rutgers University Availability of Non Contiguous Spectrum Demand for wireless services is increasing

More information

Chutima Prommak and Boriboon Deeka. Proceedings of the World Congress on Engineering 2007 Vol II WCE 2007, July 2-4, 2007, London, U.K.

Chutima Prommak and Boriboon Deeka. Proceedings of the World Congress on Engineering 2007 Vol II WCE 2007, July 2-4, 2007, London, U.K. Network Design for Quality of Services in Wireless Local Area Networks: a Cross-layer Approach for Optimal Access Point Placement and Frequency Channel Assignment Chutima Prommak and Boriboon Deeka ESS

More information

A Quality of Service aware Spectrum Decision for Cognitive Radio Networks

A Quality of Service aware Spectrum Decision for Cognitive Radio Networks A Quality of Service aware Spectrum Decision for Cognitive Radio Networks 1 Gagandeep Singh, 2 Kishore V. Krishnan Corresponding author* Kishore V. Krishnan, Assistant Professor (Senior) School of Electronics

More information

ANTI-JAMMING PERFORMANCE OF COGNITIVE RADIO NETWORKS. Xiaohua Li and Wednel Cadeau

ANTI-JAMMING PERFORMANCE OF COGNITIVE RADIO NETWORKS. Xiaohua Li and Wednel Cadeau ANTI-JAMMING PERFORMANCE OF COGNITIVE RADIO NETWORKS Xiaohua Li and Wednel Cadeau Department of Electrical and Computer Engineering State University of New York at Binghamton Binghamton, NY 392 {xli, wcadeau}@binghamton.edu

More information

Cognitive Radios Games: Overview and Perspectives

Cognitive Radios Games: Overview and Perspectives Cognitive Radios Games: Overview and Yezekael Hayel University of Avignon, France Supélec 06/18/07 1 / 39 Summary 1 Introduction 2 3 4 5 2 / 39 Summary Introduction Cognitive Radio Technologies Game Theory

More information

Implementation of Cognitive Radio Networks Based on Cooperative Spectrum Sensing Optimization

Implementation of Cognitive Radio Networks Based on Cooperative Spectrum Sensing Optimization www.semargroups.org, www.ijsetr.com ISSN 2319-8885 Vol.02,Issue.11, September-2013, Pages:1085-1091 Implementation of Cognitive Radio Networks Based on Cooperative Spectrum Sensing Optimization D.TARJAN

More information

Avoid Impact of Jamming Using Multipath Routing Based on Wireless Mesh Networks

Avoid Impact of Jamming Using Multipath Routing Based on Wireless Mesh Networks Avoid Impact of Jamming Using Multipath Routing Based on Wireless Mesh Networks M. KIRAN KUMAR 1, M. KANCHANA 2, I. SAPTHAMI 3, B. KRISHNA MURTHY 4 1, 2, M. Tech Student, 3 Asst. Prof 1, 4, Siddharth Institute

More information

LOCALIZATION AND ROUTING AGAINST JAMMERS IN WIRELESS NETWORKS

LOCALIZATION AND ROUTING AGAINST JAMMERS IN WIRELESS NETWORKS Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 5, May 2015, pg.955

More information

COGNITIVE Radio (CR) [1] has been widely studied. Tradeoff between Spoofing and Jamming a Cognitive Radio

COGNITIVE Radio (CR) [1] has been widely studied. Tradeoff between Spoofing and Jamming a Cognitive Radio Tradeoff between Spoofing and Jamming a Cognitive Radio Qihang Peng, Pamela C. Cosman, and Laurence B. Milstein School of Comm. and Info. Engineering, University of Electronic Science and Technology of

More information

Pareto Optimization for Uplink NOMA Power Control

Pareto Optimization for Uplink NOMA Power Control Pareto Optimization for Uplink NOMA Power Control Eren Balevi, Member, IEEE, and Richard D. Gitlin, Life Fellow, IEEE Department of Electrical Engineering, University of South Florida Tampa, Florida 33620,

More information

Energy-Optimized Low-Complexity Control of Power and Rate in Clustered CDMA Sensor Networks with Multirate Constraints

Energy-Optimized Low-Complexity Control of Power and Rate in Clustered CDMA Sensor Networks with Multirate Constraints Energy-Optimized Low-Complexity Control of Power and Rate in Clustered CDMA Sensor Networs with Multirate Constraints Chun-Hung Liu Department of Electrical and Computer Engineering The University of Texas

More information

Jamming Games for Power Controlled Medium Access with Dynamic Traffic

Jamming Games for Power Controlled Medium Access with Dynamic Traffic Jamming Games for Power Controlled Medium Access with Dynamic Traffic Yalin Evren Sagduyu Intelligent Automation Inc. Rockville, MD 855, USA, and Institute for Systems Research University of Maryland College

More information

Channel Allocation Algorithm Alleviating the Hidden Channel Problem in ac Networks

Channel Allocation Algorithm Alleviating the Hidden Channel Problem in ac Networks Channel Allocation Algorithm Alleviating the Hidden Channel Problem in 802.11ac Networks Seowoo Jang and Saewoong Bahk INMC, the Department of Electrical Engineering, Seoul National University, Seoul,

More information

FBMC for TVWS. Date: Authors: Name Affiliations Address Phone

FBMC for TVWS. Date: Authors: Name Affiliations Address Phone November 2013 FBMC for TVWS Date: 2014-01-22 Doc. 22-14-0012-00-000b Authors: Name Affiliations Address Phone email Dominique Noguet CEA-LETI France dominique.noguet[at]cea.fr Notice: This document has

More information

Dynamic Fair Channel Allocation for Wideband Systems

Dynamic Fair Channel Allocation for Wideband Systems Outlines Introduction and Motivation Dynamic Fair Channel Allocation for Wideband Systems Department of Mobile Communications Eurecom Institute Sophia Antipolis 19/10/2006 Outline of Part I Outlines Introduction

More information

Inducing Cooperation for Optimal Coexistence in Cognitive Radio Networks: A Game Theoretic Approach

Inducing Cooperation for Optimal Coexistence in Cognitive Radio Networks: A Game Theoretic Approach Inducing Cooperation for Optimal Coexistence in Cognitive Radio Networks: A Game Theoretic Approach Muhammad Faisal Amjad Mainak Chatterjee Cliff C. Zou Department of Electrical Engineering and Computer

More information

Spectrum Sharing with Adjacent Channel Constraints

Spectrum Sharing with Adjacent Channel Constraints Spectrum Sharing with Adjacent Channel Constraints icholas Misiunas, Miroslava Raspopovic, Charles Thompson and Kavitha Chandra Center for Advanced Computation and Telecommunications Department of Electrical

More information

How (Information Theoretically) Optimal Are Distributed Decisions?

How (Information Theoretically) Optimal Are Distributed Decisions? How (Information Theoretically) Optimal Are Distributed Decisions? Vaneet Aggarwal Department of Electrical Engineering, Princeton University, Princeton, NJ 08544. vaggarwa@princeton.edu Salman Avestimehr

More information

CHANNEL ASSIGNMENT AND LOAD DISTRIBUTION IN A POWER- MANAGED WLAN

CHANNEL ASSIGNMENT AND LOAD DISTRIBUTION IN A POWER- MANAGED WLAN CHANNEL ASSIGNMENT AND LOAD DISTRIBUTION IN A POWER- MANAGED WLAN Mohamad Haidar Robert Akl Hussain Al-Rizzo Yupo Chan University of Arkansas at University of Arkansas at University of Arkansas at University

More information

Performance Analysis of Cognitive Radio based on Cooperative Spectrum Sensing

Performance Analysis of Cognitive Radio based on Cooperative Spectrum Sensing Performance Analysis of Cognitive Radio based on Cooperative Spectrum Sensing Sai kiran pudi 1, T. Syama Sundara 2, Dr. Nimmagadda Padmaja 3 Department of Electronics and Communication Engineering, Sree

More information

A Coexistence-Aware Spectrum Sharing Protocol for WRANs

A Coexistence-Aware Spectrum Sharing Protocol for WRANs A Coexistence-Aware Spectrum Sharing Protocol for 802.22 WRANs Kaigui Bian and Jung-Min Jerry Park Department of Electrical and Computer Engineering Virginia Tech, Blacksburg, VA 24061 Email: {kgbian,

More information

Channel selection for IEEE based wireless LANs using 2.4 GHz band

Channel selection for IEEE based wireless LANs using 2.4 GHz band Channel selection for IEEE 802.11 based wireless LANs using 2.4 GHz band Jihoon Choi 1a),KyubumLee 1, Sae Rom Lee 1, and Jay (Jongtae) Ihm 2 1 School of Electronics, Telecommunication, and Computer Engineering,

More information

Distributed Game Theoretic Optimization Of Frequency Selective Interference Channels: A Cross Layer Approach

Distributed Game Theoretic Optimization Of Frequency Selective Interference Channels: A Cross Layer Approach 2010 IEEE 26-th Convention of Electrical and Electronics Engineers in Israel Distributed Game Theoretic Optimization Of Frequency Selective Interference Channels: A Cross Layer Approach Amir Leshem and

More information

A survey on broadcast protocols in multihop cognitive radio ad hoc network

A survey on broadcast protocols in multihop cognitive radio ad hoc network A survey on broadcast protocols in multihop cognitive radio ad hoc network Sureshkumar A, Rajeswari M Abstract In the traditional ad hoc network, common channel is present to broadcast control channels

More information

OPPORTUNISTIC SPECTRUM ACCESS IN MULTI-USER MULTI-CHANNEL COGNITIVE RADIO NETWORKS

OPPORTUNISTIC SPECTRUM ACCESS IN MULTI-USER MULTI-CHANNEL COGNITIVE RADIO NETWORKS 9th European Signal Processing Conference (EUSIPCO 0) Barcelona, Spain, August 9 - September, 0 OPPORTUNISTIC SPECTRUM ACCESS IN MULTI-USER MULTI-CHANNEL COGNITIVE RADIO NETWORKS Sachin Shetty, Kodzo Agbedanu,

More information

Power Allocation with Random Removal Scheme in Cognitive Radio System

Power Allocation with Random Removal Scheme in Cognitive Radio System , July 6-8, 2011, London, U.K. Power Allocation with Random Removal Scheme in Cognitive Radio System Deepti Kakkar, Arun khosla and Moin Uddin Abstract--Wireless communication services have been increasing

More information

DOWNLINK BEAMFORMING AND ADMISSION CONTROL FOR SPECTRUM SHARING COGNITIVE RADIO MIMO SYSTEM

DOWNLINK BEAMFORMING AND ADMISSION CONTROL FOR SPECTRUM SHARING COGNITIVE RADIO MIMO SYSTEM DOWNLINK BEAMFORMING AND ADMISSION CONTROL FOR SPECTRUM SHARING COGNITIVE RADIO MIMO SYSTEM A. Suban 1, I. Ramanathan 2 1 Assistant Professor, Dept of ECE, VCET, Madurai, India 2 PG Student, Dept of ECE,

More information

Continuous Monitoring Techniques for a Cognitive Radio Based GSM BTS

Continuous Monitoring Techniques for a Cognitive Radio Based GSM BTS NCC 2009, January 6-8, IIT Guwahati 204 Continuous Monitoring Techniques for a Cognitive Radio Based GSM BTS Baiju Alexander, R. David Koilpillai Department of Electrical Engineering Indian Institute of

More information

Attack-Proof Collaborative Spectrum Sensing in Cognitive Radio Networks

Attack-Proof Collaborative Spectrum Sensing in Cognitive Radio Networks Attack-Proof Collaborative Spectrum Sensing in Cognitive Radio Networks Wenkai Wang, Husheng Li, Yan (Lindsay) Sun, and Zhu Han Department of Electrical, Computer and Biomedical Engineering University

More information

FULL-DUPLEX COGNITIVE RADIO: ENHANCING SPECTRUM USAGE MODEL

FULL-DUPLEX COGNITIVE RADIO: ENHANCING SPECTRUM USAGE MODEL FULL-DUPLEX COGNITIVE RADIO: ENHANCING SPECTRUM USAGE MODEL Abhinav Lall 1, O. P. Singh 2, Ashish Dixit 3 1,2,3 Department of Electronics and Communication Engineering, ASET. Amity University Lucknow Campus.(India)

More information

Sub-band Detection of Primary User Emulation Attacks in OFDM-based Cognitive Radio Networks

Sub-band Detection of Primary User Emulation Attacks in OFDM-based Cognitive Radio Networks Sub-band Detection of Primary User Emulation Attacks in OFDM-based Cognitive Radio Networks Ahmed Alahmadi, Tianlong Song, Tongtong Li Department of Electrical & Computer Engineering Michigan State University,

More information

Performance Analysis of Cognitive Radio based WRAN over Rayleigh Fading Channel with Alamouti-STBC 2X1, 2X2&2X4 Multiplexing

Performance Analysis of Cognitive Radio based WRAN over Rayleigh Fading Channel with Alamouti-STBC 2X1, 2X2&2X4 Multiplexing Performance Analysis of Cognitive Radio based WRAN over Rayleigh Fading Channel with Alamouti-STBC 2X1 2X2&2X4 Multiplexing Rahul Koshti Assistant Professor Narsee Monjee Institute of Management Studies

More information

Networking Devices over White Spaces

Networking Devices over White Spaces Networking Devices over White Spaces Ranveer Chandra Collaborators: Thomas Moscibroda, Rohan Murty, Victor Bahl Goal: Deploy Wireless Network Base Station (BS) Good throughput for all nodes Avoid interfering

More information

Internet of Things Cognitive Radio Technologies

Internet of Things Cognitive Radio Technologies Internet of Things Cognitive Radio Technologies Torino, 29 aprile 2010 Roberto GARELLO, Politecnico di Torino, Italy Speaker: Roberto GARELLO, Ph.D. Associate Professor in Communication Engineering Dipartimento

More information

Understanding Channel and Interface Heterogeneity in Multi-channel Multi-radio Wireless Mesh Networks

Understanding Channel and Interface Heterogeneity in Multi-channel Multi-radio Wireless Mesh Networks Understanding Channel and Interface Heterogeneity in Multi-channel Multi-radio Wireless Mesh Networks Anand Prabhu Subramanian, Jing Cao 2, Chul Sung, Samir R. Das Stony Brook University, NY, U.S.A. 2

More information

Stability Analysis for Network Coded Multicast Cell with Opportunistic Relay

Stability Analysis for Network Coded Multicast Cell with Opportunistic Relay This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE ICC 00 proceedings Stability Analysis for Network Coded Multicast

More information

Degrees of Freedom of the MIMO X Channel

Degrees of Freedom of the MIMO X Channel Degrees of Freedom of the MIMO X Channel Syed A. Jafar Electrical Engineering and Computer Science University of California Irvine Irvine California 9697 USA Email: syed@uci.edu Shlomo Shamai (Shitz) Department

More information

Transmitter Power Control For Fixed and Mobile Cognitive Radio Adhoc Networks

Transmitter Power Control For Fixed and Mobile Cognitive Radio Adhoc Networks IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 12, Issue 4, Ver. I (Jul.-Aug. 2017), PP 14-20 www.iosrjournals.org Transmitter Power Control

More information

ORTHOGONAL frequency division multiplexing (OFDM)

ORTHOGONAL frequency division multiplexing (OFDM) 144 IEEE TRANSACTIONS ON BROADCASTING, VOL. 51, NO. 1, MARCH 2005 Performance Analysis for OFDM-CDMA With Joint Frequency-Time Spreading Kan Zheng, Student Member, IEEE, Guoyan Zeng, and Wenbo Wang, Member,

More information

MIMO Channel Capacity in Co-Channel Interference

MIMO Channel Capacity in Co-Channel Interference MIMO Channel Capacity in Co-Channel Interference Yi Song and Steven D. Blostein Department of Electrical and Computer Engineering Queen s University Kingston, Ontario, Canada, K7L 3N6 E-mail: {songy, sdb}@ee.queensu.ca

More information

Efficient Recovery Algorithms for Wireless Mesh Networks with Cognitive Radios

Efficient Recovery Algorithms for Wireless Mesh Networks with Cognitive Radios Efficient Recovery Algorithms for Wireless Mesh Networks with Cognitive Radios Roberto Hincapie, Li Zhang, Jian Tang, Guoliang Xue, Richard S. Wolff and Roberto Bustamante Abstract Cognitive radios allow

More information

On the Performance of Cooperative Routing in Wireless Networks

On the Performance of Cooperative Routing in Wireless Networks 1 On the Performance of Cooperative Routing in Wireless Networks Mostafa Dehghan, Majid Ghaderi, and Dennis L. Goeckel Department of Computer Science, University of Calgary, Emails: {mdehghan, mghaderi}@ucalgary.ca

More information

Innovative Science and Technology Publications

Innovative Science and Technology Publications Innovative Science and Technology Publications International Journal of Future Innovative Science and Technology, ISSN: 2454-194X Volume-4, Issue-2, May - 2018 RESOURCE ALLOCATION AND SCHEDULING IN COGNITIVE

More information

Spectrum Sharing Games of Infrastructure-Based Cognitive Radio Networks

Spectrum Sharing Games of Infrastructure-Based Cognitive Radio Networks Technical Report LCA-REPORT-2008-027, September 2008 Spectrum Sharing Games of Infrastructure-Based Cognitive Radio Networks Ghazale Hosseinabadi, Hossein Manshaei, and Jean-Pierre Hubaux Laboratory for

More information

Robust Topology Control in Multi-hop Cognitive Radio Networks

Robust Topology Control in Multi-hop Cognitive Radio Networks Robust Topology Control in Multi-hop Cognitive Radio Networks Jing Zhao and Guohong Cao Department of Computer Science and Engineering The Pennsylvania State University E-mail: {juz39,gcao}@cse.psu.edu

More information

/13/$ IEEE

/13/$ IEEE A Game-Theoretical Anti-Jamming Scheme for Cognitive Radio Networks Changlong Chen and Min Song, University of Toledo ChunSheng Xin, Old Dominion University Jonathan Backens, Old Dominion University Abstract

More information

Analysis of Dynamic Spectrum Access with Heterogeneous Networks: Benefits of Channel Packing Scheme

Analysis of Dynamic Spectrum Access with Heterogeneous Networks: Benefits of Channel Packing Scheme Analysis of Dynamic Spectrum Access with Heterogeneous Networks: Benefits of Channel Packing Scheme Ling Luo and Sumit Roy Dept. of Electrical Engineering University of Washington Seattle, WA 98195 Email:

More information

Routing versus Network Coding in Erasure Networks with Broadcast and Interference Constraints

Routing versus Network Coding in Erasure Networks with Broadcast and Interference Constraints Routing versus Network Coding in Erasure Networks with Broadcast and Interference Constraints Brian Smith Department of ECE University of Texas at Austin Austin, TX 7872 bsmith@ece.utexas.edu Piyush Gupta

More information

Review of Energy Detection for Spectrum Sensing in Various Channels and its Performance for Cognitive Radio Applications

Review of Energy Detection for Spectrum Sensing in Various Channels and its Performance for Cognitive Radio Applications American Journal of Engineering and Applied Sciences, 2012, 5 (2), 151-156 ISSN: 1941-7020 2014 Babu and Suganthi, This open access article is distributed under a Creative Commons Attribution (CC-BY) 3.0

More information

Joint Transmitter-Receiver Adaptive Forward-Link DS-CDMA System

Joint Transmitter-Receiver Adaptive Forward-Link DS-CDMA System # - Joint Transmitter-Receiver Adaptive orward-link D-CDMA ystem Li Gao and Tan. Wong Department of Electrical & Computer Engineering University of lorida Gainesville lorida 3-3 Abstract A joint transmitter-receiver

More information

Cognitive Radio Networks

Cognitive Radio Networks 1 Cognitive Radio Networks Dr. Arie Reichman Ruppin Academic Center, IL שישי טכני-רדיו תוכנה ורדיו קוגניטיבי- 1.7.11 Agenda Human Mind Cognitive Radio Networks Standardization Dynamic Frequency Hopping

More information

Coexistence Problem in IEEE Wireless Regional Area Networks

Coexistence Problem in IEEE Wireless Regional Area Networks 1 Coexistence Problem in IEEE 82.22 Wireless Regional Area Networks Raed Al-Zubi, Mohammad Z. Siam, and Marwan Krunz Department of Electrical and Computer Engineering University of Arizona, Tucson, AZ

More information

Population Adaptation for Genetic Algorithm-based Cognitive Radios

Population Adaptation for Genetic Algorithm-based Cognitive Radios Population Adaptation for Genetic Algorithm-based Cognitive Radios Timothy R. Newman, Rakesh Rajbanshi, Alexander M. Wyglinski, Joseph B. Evans, and Gary J. Minden Information Technology and Telecommunications

More information

Reconfigurable Sequential Minimal Optimization Algorithm for High- Throughput MIMO-OFDM Systems

Reconfigurable Sequential Minimal Optimization Algorithm for High- Throughput MIMO-OFDM Systems Reconfigurable Sequential Minimal Optimization Algorithm for High- Throughput MIMO-OFDM Systems S.Lakshmishree 1, J.Kumarnath 2 1 PG Student, Dept of ECE PSNA College of Engg and Tech,Tamilnadu,India 2

More information

Efficient utilization of Spectral Mask in OFDM based Cognitive Radio Networks

Efficient utilization of Spectral Mask in OFDM based Cognitive Radio Networks IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 9, Issue 6, Ver. III (Nov - Dec. 2014), PP 94-99 Efficient utilization of Spectral Mask

More information

DSASim: A simulation framework for dynamic spectrum allocation

DSASim: A simulation framework for dynamic spectrum allocation DSASim: A simulation framework for dynamic spectrum allocation Ghaith Haddad and Damla Turgut School of Electrical Engineering and Computer Science University of Central Florida Orlando, FL 32816-2362

More information

Hybrid throughput aware variable puncture rate coding for PHY-FEC in video processing

Hybrid throughput aware variable puncture rate coding for PHY-FEC in video processing IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 PP 19-21 www.iosrjen.org Hybrid throughput aware variable puncture rate coding for PHY-FEC in video processing 1 S.Lakshmi,

More information

MIMO Receiver Design in Impulsive Noise

MIMO Receiver Design in Impulsive Noise COPYRIGHT c 007. ALL RIGHTS RESERVED. 1 MIMO Receiver Design in Impulsive Noise Aditya Chopra and Kapil Gulati Final Project Report Advanced Space Time Communications Prof. Robert Heath December 7 th,

More information

Distributed Power Control in Cellular and Wireless Networks - A Comparative Study

Distributed Power Control in Cellular and Wireless Networks - A Comparative Study Distributed Power Control in Cellular and Wireless Networks - A Comparative Study Vijay Raman, ECE, UIUC 1 Why power control? Interference in communication systems restrains system capacity In cellular

More information

REMOTE CONTROL OF TRANSMIT BEAMFORMING IN TDD/MIMO SYSTEMS

REMOTE CONTROL OF TRANSMIT BEAMFORMING IN TDD/MIMO SYSTEMS The 7th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC 6) REMOTE CONTROL OF TRANSMIT BEAMFORMING IN TDD/MIMO SYSTEMS Yoshitaa Hara Kazuyoshi Oshima Mitsubishi

More information

Hybrid throughput aware variable puncture rate coding for PHY-FEC in video processing

Hybrid throughput aware variable puncture rate coding for PHY-FEC in video processing IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p-issn: 2278-8727, Volume 20, Issue 3, Ver. III (May. - June. 2018), PP 78-83 www.iosrjournals.org Hybrid throughput aware variable puncture

More information

Beamforming and Binary Power Based Resource Allocation Strategies for Cognitive Radio Networks

Beamforming and Binary Power Based Resource Allocation Strategies for Cognitive Radio Networks 1 Beamforming and Binary Power Based Resource Allocation Strategies for Cognitive Radio Networks UWB Walter project Workshop, ETSI October 6th 2009, Sophia Antipolis A. Hayar EURÉCOM Institute, Mobile

More information

A Bi-Level Programming Model for the Wireless Network Jamming Placement Problem

A Bi-Level Programming Model for the Wireless Network Jamming Placement Problem Proceedings of the 2014 Industrial and Systems Engineering Research Conference Y. Guan and H. Liao, eds. A Bi-Level Programming Model for the Wireless Network Jamming Placement Problem Satish Vadlamani

More information

Performance Evaluation of Spectrum Sensing Methods for Cognitive Radio

Performance Evaluation of Spectrum Sensing Methods for Cognitive Radio International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347 5161 2016 INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet Research Article Performance

More information

Uplink and Downlink Beamforming for Fading Channels. Mats Bengtsson and Björn Ottersten

Uplink and Downlink Beamforming for Fading Channels. Mats Bengtsson and Björn Ottersten Uplink and Downlink Beamforming for Fading Channels Mats Bengtsson and Björn Ottersten 999-02-7 In Proceedings of 2nd IEEE Signal Processing Workshop on Signal Processing Advances in Wireless Communications,

More information

SIMULATION OF COOPERATIVE SPECTRUM SENSING TECHNIQUES IN COGNITIVE RADIO USING MATLAB

SIMULATION OF COOPERATIVE SPECTRUM SENSING TECHNIQUES IN COGNITIVE RADIO USING MATLAB SIMULATION OF COOPERATIVE SPECTRUM SENSING TECHNIQUES IN COGNITIVE RADIO USING MATLAB 1 ARPIT GARG, 2 KAJAL SINGHAL, 3 MR. ARVIND KUMAR, 4 S.K. DUBEY 1,2 UG Student of Department of ECE, AIMT, GREATER

More information

Delay Based Scheduling For Cognitive Radio Networks

Delay Based Scheduling For Cognitive Radio Networks Delay Based Scheduling For Cognitive Radio Networks A.R.Devi 1 R.Arun kumar 2 S.Kannagi 3 P.G Student P.S.R Engineering College, India 1 Assistant professor at P.S.R Engineering College, India 2 P.G Student

More information

Beamforming with Imperfect CSI

Beamforming with Imperfect CSI This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the WCNC 007 proceedings Beamforming with Imperfect CSI Ye (Geoffrey) Li

More information

Spectrum Sensing for Dynamic Spectrum Access of TV Bands (Invited Paper)

Spectrum Sensing for Dynamic Spectrum Access of TV Bands (Invited Paper) Spectrum Sensing for Dynamic Spectrum Access of TV Bands (Invited Paper) Carlos Cordeiro, Monisha Ghosh, Dave Cavalcanti, and Kiran Challapali Wireless Communication and Networking Department Philips Research

More information

Optimal Utility-Based Resource Allocation for OFDM Networks with Multiple Types of Traffic

Optimal Utility-Based Resource Allocation for OFDM Networks with Multiple Types of Traffic Optimal Utility-Based Resource Allocation for OFDM Networks with Multiple Types of Traffic Mohammad Katoozian, Keivan Navaie Electrical and Computer Engineering Department Tarbiat Modares University, Tehran,

More information

Understanding and Mitigating the Impact of Interference on Networks. By Gulzar Ahmad Sanjay Bhatt Morteza Kheirkhah Adam Kral Jannik Sundø

Understanding and Mitigating the Impact of Interference on Networks. By Gulzar Ahmad Sanjay Bhatt Morteza Kheirkhah Adam Kral Jannik Sundø Understanding and Mitigating the Impact of Interference on 802.11 Networks By Gulzar Ahmad Sanjay Bhatt Morteza Kheirkhah Adam Kral Jannik Sundø 1 Outline Background Contributions 1. Quantification & Classification

More information

Adaptive Channel Allocation in OFDM/SDMA Wireless LANs with Limited Transceiver Resources

Adaptive Channel Allocation in OFDM/SDMA Wireless LANs with Limited Transceiver Resources Adaptive Channel Allocation in OFDM/SDMA Wireless LANs with Limited Transceiver Resources Iordanis Koutsopoulos and Leandros Tassiulas Department of Computer and Communications Engineering, University

More information

A Location-Aware Routing Metric (ALARM) for Multi-Hop, Multi-Channel Wireless Mesh Networks

A Location-Aware Routing Metric (ALARM) for Multi-Hop, Multi-Channel Wireless Mesh Networks A Location-Aware Routing Metric (ALARM) for Multi-Hop, Multi-Channel Wireless Mesh Networks Eiman Alotaibi, Sumit Roy Dept. of Electrical Engineering U. Washington Box 352500 Seattle, WA 98195 eman76,roy@ee.washington.edu

More information

Common Control Channel Allocation in Cognitive Radio Networks through UWB Multi-hop Communications

Common Control Channel Allocation in Cognitive Radio Networks through UWB Multi-hop Communications The first Nordic Workshop on Cross-Layer Optimization in Wireless Networks at Levi, Finland Common Control Channel Allocation in Cognitive Radio Networks through UWB Multi-hop Communications Ahmed M. Masri

More information

Spectrum Sensing Using Bayesian Method for Maximum Spectrum Utilization in Cognitive Radio

Spectrum Sensing Using Bayesian Method for Maximum Spectrum Utilization in Cognitive Radio 5 Spectrum Sensing Using Bayesian Method for Maximum Spectrum Utilization in Cognitive Radio Anurama Karumanchi, Mohan Kumar Badampudi 2 Research Scholar, 2 Assoc. Professor, Dept. of ECE, Malla Reddy

More information

Estimation of I/Q Imblance in Mimo OFDM System

Estimation of I/Q Imblance in Mimo OFDM System Estimation of I/Q Imblance in Mimo OFDM System K.Anusha Asst.prof, Department Of ECE, Raghu Institute Of Technology (AU), Vishakhapatnam, A.P. M.kalpana Asst.prof, Department Of ECE, Raghu Institute Of

More information

We are IntechOpen, the world s leading publisher of Open Access books Built by scientists, for scientists. International authors and editors

We are IntechOpen, the world s leading publisher of Open Access books Built by scientists, for scientists. International authors and editors We are IntechOpen, the world s leading publisher of Open Access books Built by scientists, for scientists 3,900 116,000 120M Open access books available International authors and editors Downloads Our

More information

Efficient Method of Secondary Users Selection Using Dynamic Priority Scheduling

Efficient Method of Secondary Users Selection Using Dynamic Priority Scheduling Efficient Method of Secondary Users Selection Using Dynamic Priority Scheduling ABSTRACT Sasikumar.J.T 1, Rathika.P.D 2, Sophia.S 3 PG Scholar 1, Assistant Professor 2, Professor 3 Department of ECE, Sri

More information

Short Paper: On Optimal Sensing and Transmission Strategies for Dynamic Spectrum Access

Short Paper: On Optimal Sensing and Transmission Strategies for Dynamic Spectrum Access Short Paper: On Optimal Sensing and Transmission Strategies for Dynamic Spectrum Access Senhua Huang, Xin Liu, and Zhi Ding University of California Davis Davis, CA 95616, USA Email: senhua@ece.ucdavis.edu

More information

Frequency and Power Allocation for Low Complexity Energy Efficient OFDMA Systems with Proportional Rate Constraints

Frequency and Power Allocation for Low Complexity Energy Efficient OFDMA Systems with Proportional Rate Constraints Frequency and Power Allocation for Low Complexity Energy Efficient OFDMA Systems with Proportional Rate Constraints Pranoti M. Maske PG Department M. B. E. Society s College of Engineering Ambajogai Ambajogai,

More information

COGNITIVE RADIO TECHNOLOGY: ARCHITECTURE, SENSING AND APPLICATIONS-A SURVEY

COGNITIVE RADIO TECHNOLOGY: ARCHITECTURE, SENSING AND APPLICATIONS-A SURVEY COGNITIVE RADIO TECHNOLOGY: ARCHITECTURE, SENSING AND APPLICATIONS-A SURVEY G. Mukesh 1, K. Santhosh Kumar 2 1 Assistant Professor, ECE Dept., Sphoorthy Engineering College, Hyderabad 2 Assistant Professor,

More information

MULTIPATH fading could severely degrade the performance

MULTIPATH fading could severely degrade the performance 1986 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 53, NO. 12, DECEMBER 2005 Rate-One Space Time Block Codes With Full Diversity Liang Xian and Huaping Liu, Member, IEEE Abstract Orthogonal space time block

More information

[Kavyalakshmi*, 4.(12): December, 2015] ISSN: (I2OR), Publication Impact Factor: 3.785

[Kavyalakshmi*, 4.(12): December, 2015] ISSN: (I2OR), Publication Impact Factor: 3.785 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY A CROSSLAYER PROTOCOL DESIGN APPROACH BETWEEN PHY AND MAC LAYER FOR COGNITIVE RADIO NETWORKS Kavyalakshmi.K*, Mrs.Padmavathi.G

More information

Spectrum Management and Cognitive Radio

Spectrum Management and Cognitive Radio Spectrum Management and Cognitive Radio Alessandro Guidotti Tutor: Prof. Giovanni Emanuele Corazza, University of Bologna, DEIS Co-Tutor: Ing. Guido Riva, Fondazione Ugo Bordoni The spectrum scarcity problem

More information

Cognitive Radio: Smart Use of Radio Spectrum

Cognitive Radio: Smart Use of Radio Spectrum Cognitive Radio: Smart Use of Radio Spectrum Miguel López-Benítez Department of Electrical Engineering and Electronics University of Liverpool, United Kingdom M.Lopez-Benitez@liverpool.ac.uk www.lopezbenitez.es,

More information

Multi-Band Spectrum Allocation Algorithm Based on First-Price Sealed Auction

Multi-Band Spectrum Allocation Algorithm Based on First-Price Sealed Auction BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 17, No 1 Sofia 2017 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.1515/cait-2017-0008 Multi-Band Spectrum Allocation

More information

Channel Capacity Estimation in MIMO Systems Based on Water-Filling Algorithm

Channel Capacity Estimation in MIMO Systems Based on Water-Filling Algorithm Channel Capacity Estimation in MIMO Systems Based on Water-Filling Algorithm 1 Ch.Srikanth, 2 B.Rajanna 1 PG SCHOLAR, 2 Assistant Professor Vaagdevi college of engineering. (warangal) ABSTRACT power than

More information

Generalized Signal Alignment For MIMO Two-Way X Relay Channels

Generalized Signal Alignment For MIMO Two-Way X Relay Channels Generalized Signal Alignment For IO Two-Way X Relay Channels Kangqi Liu, eixia Tao, Zhengzheng Xiang and Xin Long Dept. of Electronic Engineering, Shanghai Jiao Tong University, Shanghai, China Emails:

More information

How to tackle 5G challenges Dr. Dominique Noguet Head of Communication and Security Technologies Dpt CEA-LETI

How to tackle 5G challenges Dr. Dominique Noguet Head of Communication and Security Technologies Dpt CEA-LETI How to tackle 5G challenges Dr. Dominique Noguet Head of Communication and Security Technologies Dpt CEA-LETI Dr. Emilio Calvanese Strinati Smart Devices & Telecommunications Strategy Program Director

More information

Cooperative Spectrum Sharing in Cognitive Radio Networks: A Game-Theoretic Approach

Cooperative Spectrum Sharing in Cognitive Radio Networks: A Game-Theoretic Approach Cooperative Spectrum Sharing in Cognitive Radio Networks: A Game-Theoretic Approach Haobing Wang, Lin Gao, Xiaoying Gan, Xinbing Wang, Ekram Hossain 2. Department of Electronic Engineering, Shanghai Jiao

More information

A Brief Review of Cognitive Radio and SEAMCAT Software Tool

A Brief Review of Cognitive Radio and SEAMCAT Software Tool 163 A Brief Review of Cognitive Radio and SEAMCAT Software Tool Amandeep Singh Bhandari 1, Mandeep Singh 2, Sandeep Kaur 3 1 Department of Electronics and Communication, Punjabi university Patiala, India

More information

Detection and Prevention of Physical Jamming Attacks in Vehicular Environment

Detection and Prevention of Physical Jamming Attacks in Vehicular Environment Detection and Prevention of Physical Jamming Attacks in Vehicular Environment M-Tech Student 1 Mahendri 1, Neha Sawal 2 Assit. Prof. 2 &Department of CSE & NGF College of Engineering &Technology Palwal,

More information

Analysis and Improvements of Linear Multi-user user MIMO Precoding Techniques

Analysis and Improvements of Linear Multi-user user MIMO Precoding Techniques 1 Analysis and Improvements of Linear Multi-user user MIMO Precoding Techniques Bin Song and Martin Haardt Outline 2 Multi-user user MIMO System (main topic in phase I and phase II) critical problem Downlink

More information

Application of combined TOPSIS and AHP method for Spectrum Selection in Cognitive Radio by Channel Characteristic Evaluation

Application of combined TOPSIS and AHP method for Spectrum Selection in Cognitive Radio by Channel Characteristic Evaluation International Journal of Electronics and Communication Engineering. ISSN 0974-2166 Volume 10, Number 2 (2017), pp. 71 79 International Research Publication House http://www.irphouse.com Application of

More information

ADAPTIVE RESOURCE ALLOCATION FOR WIRELESS MULTICAST MIMO-OFDM SYSTEMS

ADAPTIVE RESOURCE ALLOCATION FOR WIRELESS MULTICAST MIMO-OFDM SYSTEMS ADAPTIVE RESOURCE ALLOCATION FOR WIRELESS MULTICAST MIMO-OFDM SYSTEMS SHANMUGAVEL G 1, PRELLY K.E 2 1,2 Department of ECE, DMI College of Engineering, Chennai. Email: shangvcs.in@gmail.com, prellyke@gmail.com

More information

Cooperative Spectrum Sensing and Spectrum Sharing in Cognitive Radio: A Review

Cooperative Spectrum Sensing and Spectrum Sharing in Cognitive Radio: A Review International Journal of Computer Applications in Engineering Sciences [VOL I, ISSUE III, SEPTEMBER 2011] [ISSN: 2231-4946] Cooperative Spectrum Sensing and Spectrum Sharing in Cognitive Radio: A Review

More information